Cart
Free US shipping over $10
Proud to be B-Corp

Modern Vulnerability Management: Predictive Cybersecurity Michael Roytman

Modern Vulnerability Management: Predictive Cybersecurity By Michael Roytman

Modern Vulnerability Management: Predictive Cybersecurity by Michael Roytman


$126.99
Condition - New
6 in stock

Modern Vulnerability Management: Predictive Cybersecurity Summary

Modern Vulnerability Management: Predictive Cybersecurity by Michael Roytman

This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) - one of the most challenging tasks in cybersecurity -- from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that pose the greatest threat to your organization. You will learn: how to structure data pipelines in security and derive and measure value from them; where to procure open-source data to better your organization's pipeline and how to structure it; how to build a predictive model using vulnerability data; how to measure the return on investment a model in security can yield; which organizational structures and policies work best, and how to use data science to detect when they are not working in security; and ways to manage organizational change around data science implementation.

You'll also be shown real-world examples of how to mature an RBVM program and will understand how to prioritize remediation efforts based on which vulnerabilities pose the greatest risk to your organization. The book presents a fresh approach, rooted in risk management, and taking advantage of rich data and machine learning, helping you focus more on what matters and ultimately make your organization more secure with a system commensurate to the scale of the threat.

This is a timely and much-needed book for security managers and practitioners who need to evaluate their organizations and plan future projects and change. Students of cybersecurity will also find this a valuable introduction on how to use their skills in the enterprise workplace to drive change.

Table of Contents

Chapter 1 - The State of the Vulnerability Landscape

1.1 The security canon: Fundamental cybersecurity terminology
1.2 Security metrics: The new guard

Chapter 2 - Data Science to Define Risk

2.1 Risk management history and challenges
2.1.1 The birth of operations research
2.1.2 The scale of cybersecurity
2.1.3 Origins of the risk-based approach to vulnerability management

Chapter 3 - Decision Support: Tapping Mathematical Models and Machine Learning

3.1 Mathematical modelling
3.1.1 Mathematical scale
3.1.1 Statistics
3.1.2 Game theory
3.1.2.1 Stochastic processes
3.1.2.2 OODA loops
3.1.3 Machine learning for cybersecurity
3.1.3.1 Supervised models
3.1.3.2 Unsupervised models

Chapter 4 - How to Build a Decision Engine to Forecast Risk

4.1 The Data
4.1.1 Definitions vs. instances
4.1.2 Vulnerability data
4.1.2.1 Vulnerability assessment
4.1.2.2 SAST/DAST
4.1.3 Threat intel sources
4.1.4 Asset discovery and categorization (CMDB)
4.1.5 Data validation
4.1.5.1 ETL
4.2 Building a logistic regression model
4.2.1 Data sources and feature engineering
4.2.1.1 Feature engineering
4.2.1.2 Interpretation of features
4.2.2 Testing model performance
4.2.2.1 Calibration plot
4.2.2.2 Simplicity vs performance
4.2.3 Implementing in production
4.2.3.1 Data preparation
4.2.3.2 Application of the model
4.2.3.3 Converting log odds to probability
4.2.4 Communicating the results
4.3 Designing a neural network
4.3.1 Preparing the data
4.3.2 Developing a neural network model
4.3.2.1 Neural network architecture
4.3.3 Hyper-parameter exploration and evaluation
4.3.4 Scoring
4.3.4.1 Score scaling
4.3.4.2 Volume scaling
4.3.4.3 Combining scores
4.3.4.4 Comparison to existing scoring model
4.3.5 Future work

Chapter 5 - Measuring Performance

5.1 Risk vs performance
5.2 What makes a metric good?
5.2.1 7 characteristics of good metrics
5.2.2 Evaluating metrics using the 7 criteria
5.2.3 More considerations for good metrics
5.3 Remediation metrics
5.3.1 Mean-time-tos
5.3.2 Remediation volume and velocity
5.3.3 R values and average remediation rates
5.4 Why does performance matter?
5.5 Measuring what matters
5.5.1 Coverage and efficiency
5.5.1.1 Optimizing the tradeoff between coverage and efficiency with predictive models
5.5.1.2 Coverage and efficiency in the real world
5.5.2 Velocity and capacity
5.5.2.1 How much does capacity cost?
5.5.2.2 The power law of capacity
5.5.3 Vulnerability debt
5.5.3.1 The move to the cloud
5.5.3.2 Paying down security debt
5.5.4 Remediation SLAs

Chapter 6 - Building a System for Scale

6.1 Considerations before you build
6.1.1 Asset management assessment
6.1.2 Where your organization is going
6.1.3 Other tools as constraints
6.2 On-premise vs. cloud
6.3 Processing considerations
6.3.1 Speed of decisions and alerts
6.3.2 SOC volume
6.4 Database architecture
6.4.1 Assets change faster than decisions
6.4.2 Real-time risk measurement
6.4.2.1 Vulnerability forecasts
6.4.2.2 Batch where acceptable
6.5 Search capabilities
6.5.1 Who is searching?
6.5.1.1 Risk hunting vs. threat hunting
6.5.1.2 Reporting as a service
6.6 Role-based access controls (RBAC)

Chapter 7 - Aligning Internal Process and Teams

7.1 The shift to a risk-based approach
7.1.1 Common goals and key risk measurements
7.1.2 Case study: More granular risk scores for better prioritization
7.1.2.1 The importance of culture in adopting RBVM
7.2 Driving down risk
7.2.1 Aligning teams with your goals
7.2.2 The importance of executive buy-in
7.2.3 Reporting new metrics
7.2.4 Gamification
7.3 SLA adherence
7.3.1 High-risk vs. low-risk vulnerabilities
7.3.2 When to implement or revise SLAs
7.3.3 What to include in your SLA
7.4 Shifting from security-centric to IT self-service
7.4.1 How to approach change management
7.4.2 Enabling distributed decision-making
7.4.3 Signs of self-service maturity
7.5 Steady state workflow
7.5.1 The limits of remediation capacity
7.5.2 Media-boosted vulnerabilities
7.5.3 Exception handling
7.6 The importance of process and teams

Chapter 8 - Real World Examples

8.1 A word from the real world by Will LaRiccia
8.1.1 Vulnerability discovery
8.1.2 Vulnerability assessment and prioritization
8.1.3 Vulnerability communication
8.1.4 Vulnerability remediation
8.1.5 What success looks like

Chapter 9 - The Future of Modern VM

9.1 Steps toward a predictive response to risk
9.1.1 Passive data collection
9.2 Forecasting vulnerability exploitation with EPSS
9.3 Support from intelligent awareness
9.4 The rise of extended detection and response (XDR)
9.5 The other side of the coin: Remediation
9.6 The wicked problem of security advances

Additional information

NGR9781630819385
9781630819385
1630819387
Modern Vulnerability Management: Predictive Cybersecurity by Michael Roytman
New
Hardback
Artech House Publishers
2023-03-31
265
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a new book - be the first to read this copy. With untouched pages and a perfect binding, your brand new copy is ready to be opened for the first time

Customer Reviews - Modern Vulnerability Management: Predictive Cybersecurity